咨询与建议

限定检索结果

文献类型

  • 79,803 篇 会议
  • 2,045 册 图书
  • 852 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 82,706 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 48,409 篇 工学
    • 37,955 篇 计算机科学与技术...
    • 27,175 篇 软件工程
    • 15,909 篇 信息与通信工程
    • 6,867 篇 控制科学与工程
    • 5,572 篇 电气工程
    • 4,392 篇 生物工程
    • 4,140 篇 电子科学与技术(可...
    • 3,335 篇 生物医学工程(可授...
    • 3,260 篇 机械工程
    • 2,776 篇 网络空间安全
    • 2,735 篇 仪器科学与技术
    • 2,520 篇 动力工程及工程热...
    • 2,204 篇 安全科学与工程
    • 2,030 篇 光学工程
    • 1,738 篇 交通运输工程
    • 1,622 篇 化学工程与技术
  • 17,761 篇 理学
    • 9,063 篇 数学
    • 4,783 篇 生物学
    • 4,093 篇 物理学
    • 2,878 篇 统计学(可授理学、...
    • 2,185 篇 系统科学
    • 1,873 篇 化学
  • 14,033 篇 管理学
    • 8,630 篇 管理科学与工程(可...
    • 6,558 篇 图书情报与档案管...
    • 4,356 篇 工商管理
  • 3,506 篇 医学
    • 2,799 篇 临床医学
    • 2,708 篇 基础医学(可授医学...
    • 1,888 篇 公共卫生与预防医...
  • 2,751 篇 法学
    • 2,254 篇 社会学
  • 1,699 篇 经济学
    • 1,620 篇 应用经济学
  • 1,323 篇 教育学
  • 1,271 篇 农学
  • 650 篇 文学
  • 263 篇 军事学
  • 97 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 3,541 篇 cloud computing
  • 2,628 篇 mobile communica...
  • 2,493 篇 wireless communi...
  • 2,247 篇 computational mo...
  • 2,018 篇 internet of thin...
  • 1,882 篇 mobile computing
  • 1,868 篇 wireless sensor ...
  • 1,761 篇 accuracy
  • 1,568 篇 protocols
  • 1,426 篇 security
  • 1,389 篇 real-time system...
  • 1,366 篇 servers
  • 1,362 篇 feature extracti...
  • 1,347 篇 computer archite...
  • 1,340 篇 deep learning
  • 1,201 篇 machine learning
  • 1,180 篇 training
  • 1,172 篇 information tech...
  • 1,153 篇 artificial intel...
  • 1,121 篇 routing

机构

  • 342 篇 department of co...
  • 298 篇 maharishi school...
  • 223 篇 chitkara univers...
  • 173 篇 department of co...
  • 166 篇 school of comput...
  • 125 篇 shenyang institu...
  • 119 篇 maharishi school...
  • 102 篇 university of ch...
  • 77 篇 centre of interd...
  • 74 篇 department of la...
  • 69 篇 centre of resear...
  • 67 篇 karnataka bangal...
  • 64 篇 department of el...
  • 63 篇 department of in...
  • 62 篇 chitkara univers...
  • 60 篇 department of el...
  • 57 篇 lovely professio...
  • 53 篇 school of inform...
  • 52 篇 computer science...
  • 52 篇 state key labora...

作者

  • 104 篇 leonard barolli
  • 39 篇 wang lei
  • 35 篇 li yang
  • 33 篇 jui c.c.h.
  • 33 篇 oshima a.
  • 33 篇 tsuda r.
  • 33 篇 kim j.h.
  • 33 篇 bergman d.r.
  • 32 篇 wang jing
  • 32 篇 allen m.
  • 31 篇 zhang lei
  • 27 篇 yingsong li
  • 27 篇 u. qasim
  • 27 篇 malik bader alaz...
  • 27 篇 fatos xhafa
  • 25 篇 zhang tao
  • 25 篇 jian wang
  • 23 篇 sudeep tanwar
  • 22 篇 li peng
  • 22 篇 kumar ajay

语言

  • 80,437 篇 英文
  • 1,656 篇 其他
  • 731 篇 中文
  • 5 篇 阿拉伯文
  • 3 篇 法文
  • 3 篇 俄文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Advances in Information Communication Technology and Computing"
82706 条 记 录,以下是4781-4790 订阅
排序:
A Stacked Model Approach for Machine Learning-Based Traffic Prediction  2nd
A Stacked Model Approach for Machine Learning-Based Traffic ...
收藏 引用
2nd international conference on advances in Data-driven computing and Intelligent Systems, ADCIS 2023
作者: Divakarla, Usha Chandrasekaran, K. N. M. A. M. Institute of Technology Karkala Nitte India National Institute of Technology Karnataka Surathkal India
The application of technology for sensing, analysis, control, and communication within ground transportation is referred to as an intelligent transportation system. This system aims to enhance safety, mobility, and ef... 详细信息
来源: 评论
Unmanned Aerial Vehicle-aided Auditory Intrusion Detection Systems: An Experimental Exploration
Unmanned Aerial Vehicle-aided Auditory Intrusion Detection S...
收藏 引用
2023 international conference on advances in Computation, communication and information technology, ICAICCIT 2023
作者: Bhawal, Abhirup Patil, Nagaraj Agrawal, Trapty Presidency University Department of Electronics and Communication Engineering Karnataka India Faculty of Engineering and Technology Department of Mechanical Engineering Karnataka India Maharishi University of Information Technology Maharishi School of Engineering & Technology Uttar Pradesh India
Regulations have traditionally hindered the integration of unmanned aircraft systems (UASs), sometimes referred to as aerial vehicles, into business endeavors. Nonetheless, the Federal Aviation Administration's (F... 详细信息
来源: 评论
Trusted Computation for Cloud VM Lifetime Security
Trusted Computation for Cloud VM Lifetime Security
收藏 引用
2023 international conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Aruna, M. Nachappa, M.N. Singh, Akhilendra Pratap Presidency University Department of Electronics and Communication Engineering Karnataka Bangalore India Department of Computer Science and Information Technology Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
Virtual machines (VMs) are essential components of cloud computing platforms, but they are subject to many security risks during the course of their existence. Threats in various VM states are often addressed by exist... 详细信息
来源: 评论
Fusion of Two View Mammographic Texture information Through Binary BAT Algorithm for Enhanced Breast Cancer Detection  2
Fusion of Two View Mammographic Texture Information Through ...
收藏 引用
2nd international conference on Advancements in Electrical, Electronics, communication, computing and Automation, ICAECA 2023
作者: Sasikala, S. Kumar, S. Arun Dept. of Electronics and Communication Engg Kumaraguru College of Technology Coimbatore India
Female breast cancer is a mortal disease. Every year its incidences and mortality rate increase globally. According to statistics studies, number of breast cancers estimated during 2010, 2015 and 2020 are 0.09, 1.06 a... 详细信息
来源: 评论
Opinion Detection in Hinglish News Reporting
Opinion Detection in Hinglish News Reporting
收藏 引用
2023 international conference on advances in Intelligent computing and Applications, AICAPS 2023
作者: Ananya Kaushal, Rishabh Indira Gandhi Delhi Technical University for Women Department of Information Technology Delhi India
News bulletins play an important role in people's daily lives. As humans evolved, so did our ability to form opinions. In the domain of journalism and news reporting, it is desirable that those reporting news do n... 详细信息
来源: 评论
Intelligent Reconfiguration Structure to Enhance 6G Network Transmission  1
Intelligent Reconfiguration Structure to Enhance 6G Network ...
收藏 引用
1st international conference on advances in Computer Science, Electrical, Electronics, and communication Technologies, CE2CT 2025
作者: Chaudhary, Pavan Kenchappa, Ranganathaswamy Madihalli Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Mechanical Engineering Ramnagar District Karnataka India
This study presents a brand-new, extremely efficient mixed reconfigurable intelligent surface (RIS) technique intended to improve coverage area and substantially lower power loss in 6G networks. The Hybrid reconfigura... 详细信息
来源: 评论
Enhancing the Security of Healthcare Data in Cloud computing Environments  2
Enhancing the Security of Healthcare Data in Cloud Computing...
收藏 引用
2nd international conference on Computational Intelligence, communication technology and Networking, CICTN 2025
作者: Sajwan, Himani Kumari, Anjali Chauhan, Garima Kumar, Raj School of Computer Applications Manav Rachna International Institute of Research & Studies Faridabad India
Cloud computing has completely evolved the way health care data is managed, but it also introduces critical security vulnerabilities that can compromise the privacy of patient information and threaten regulatory compl... 详细信息
来源: 评论
A Method of PV Power Generation Forecasting using Constrained Transformer Network  5
A Method of PV Power Generation Forecasting using Constraine...
收藏 引用
5th international conference on Artificial Intelligence in information and communication (ICAIIC)
作者: Tran, Duc Hoang Nguyen, Van Linh Utama, Ida Bagus Krishna Yoga Nguyen, Huy Chung, ByungDeok Jang, Yeong Min Kookmin Univ Dept Elect Engn Seoul 02707 South Korea ENS Co Ltd Ansan 15655 South Korea
This paper introduces a method using a physics-constrained Transformer model attached to an edge computer for photovoltaic power generation that considers specific domain knowledge and increases the performance of the... 详细信息
来源: 评论
Security Challenges and Future Privacy Perspectives in Cloud computing for Smart City Environments
Security Challenges and Future Privacy Perspectives in Cloud...
收藏 引用
2023 international conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Tayal, Ankit Bhatia, Gaurav Singh, Jay Bansal, Mohit Anitha, G. Gl Bajaj Institute of Technology & Management Electrical Engineering Department Gr. Noida India Gl Bajaj Institute of Technology & Management Computer Application Department Gr. Noida India Institute of Aeronautical 5Engineering Department of Computer Science and Information Technology Hyderabad India
The context of smart cities and cloud computing is essential to understanding the broader landscape in which security challenges and privacy perspectives play pivotal roles in enhancing the quality of life for the res... 详细信息
来源: 评论
Enhanced Web Security Using Cross-Feature Analysis of Visual Design, Live Logs and Code Structures  9
Enhanced Web Security Using Cross-Feature Analysis of Visual...
收藏 引用
9th international conference on communication and Electronics Systems, ICCES 2024
作者: Kumar, Rahul Sharma, Tanvi Saranya, G. School of Computing College of Engineering and Technology Srm Institute of Science and Technology Department of Networking and Communication Tamil Nadu Kattankulathur603203 India
Threats using website visual designs and content structures, along with standard coding vulnerabilities, represent an increasing danger to web security. To enhance web security, this paper introduces a new method call... 详细信息
来源: 评论